Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Unveiling TSSHOCK: New key extraction attacks on Multi-Party Computation wallets and digital asset custody solutions, demonstrating vulnerabilities in widely-used Threshold Signature Schemes.
Explore a hybrid analysis method combining smart contract decompilation and EVM simulation to identify vulnerabilities in Ethereum projects, with practical demonstrations and insights.
Uncover critical vulnerabilities in Azure Machine Learning, including credential leaks, information disclosure, and persistence techniques. Learn assessment methods for cloud-based MLaaS platforms and shared responsibility models.
Revealing vulnerabilities in cryptocurrency hardware wallets, focusing on the OneKey Mini's security flaws. Demonstrates live exploit to extract and crack the seed, recovering stored funds in under one second.
Prize giving ceremony and closing remarks for the HITB2023AMS Capture The Flag competition, highlighting achievements and concluding the event.
Exploring the interplay between cybersecurity attacks and defenses, this talk examines evolving strategies, stakeholder mindsets, and proactive approaches for a more secure digital future.
Explore Web3 fundamentals, including blockchain transactions, technology stack, token standards, and security risks, using OSINT techniques and free online tools.
Explores security risks in modern CNC machines, demonstrating practical attacks and discussing mitigation strategies for Industry 4.0 vulnerabilities in manufacturing environments.
Explore privilege escalation in MacOS using Data-Oriented Programming (DOP), a powerful exploit technique that leverages heap buffer overflow vulnerabilities for persistent attacks resistant to kernel code changes.
Explore GarminOS and MonkeyC VM, uncovering critical vulnerabilities in Garmin devices. Learn about reverse engineering, virtual machine internals, and exploiting low-level security flaws in smart fitness technology.
Comprehensive exploration of Active Directory attack techniques, demonstrating real-world abuse primitives and attack paths. Includes practical demonstrations and operational guidance for both offensive and defensive perspectives.
Exploring ARM Trusted Firmware, secure boot, and encryption vulnerabilities in smart devices. Demonstrates exploits on Lenovo clock and SONOS One, revealing secrets and breaking security boundaries.
Exploración de vulnerabilidades crÃticas en SAP, demostrando técnicas avanzadas de explotación HTTP y desincronización para comprometer sistemas empresariales. Incluye demostraciones prácticas y análisis de impacto en la seguridad global.
Explore how ChatGPT can be used to create advanced polymorphic malware, discussing the challenges, implementation techniques, and potential threats posed by AI-generated malicious software.
Innovative approach for IoT black-box fuzzing using "fuzzing triggers" from companion apps to generate optimal inputs, overcoming limitations of existing tools and discovering zero-day vulnerabilities.
Get personalized course recommendations, track subjects and courses with reminders, and more.